5-Layer Model, Compartmentalization & Blast Radius Control
Resilience & Infrastructure | Technical Operations Excellence
| Layer | Function | Example |
|---|---|---|
| 1. Perimeter | Edge protection | WAF, firewall |
| 2. Network | Segmentation | VLANs, VPCs |
| 3. Host | Hardening | Patches, config |
| 4. Application | Code security | Input validation |
| 5. Data | Encryption | At rest, in transit |
Multiple layers must fail for a breach to succeed
| Strategy | Description |
|---|---|
| Role Separation | Different jobs run as distinct accounts |
| Location Separation | Geographic isolation (multi-region) |
| Time Separation | Key rotation forces continuous presence |
Partition into independent copies
Stop cascading failures at boundaries
Isolate resource pools per tenant/service
| Tier | Data Type | Controls |
|---|---|---|
| Public | Company-wide | Low-risk |
| Sensitive | Authorized only | Medium-high |
| Highly Sensitive | No permanent access | MPA required |
| Pattern | Description |
|---|---|
| N+1 | One spare for failover |
| N+2 | Two spares (for critical systems) |
| Active-Active | All replicas serve traffic |
| Active-Passive | Standby on failover |
N+2 for tier-0 critical systems
| Principle | Application |
|---|---|
| Go fast, guarded | Speed with policy guardrails |
| Minimize time deps | Don't wait for wall-clock |
| Know intended state | Encode complete config |
| Emergency access | Works when systems fail |
Assume Breach
Design so attackers must breach ALL layers.